{"id":1577,"date":"2019-09-19T10:23:46","date_gmt":"2019-09-19T08:23:46","guid":{"rendered":"https:\/\/www.apvnorge.no\/?page_id=1577"},"modified":"2021-02-18T13:43:48","modified_gmt":"2021-02-18T12:43:48","slug":"news","status":"publish","type":"page","link":"https:\/\/www.apvnorge.no\/cz\/news\/","title":{"rendered":"NOVINKY"},"content":{"rendered":"<div id=\"apvno-3050347225\" class=\"apvno-before-content apvno-entity-placement\"><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-7003427967427457\" crossorigin=\"anonymous\"><\/script><ins class=\"adsbygoogle\" style=\"display:inline-block;width:970px;height:250px;\" \ndata-ad-client=\"ca-pub-7003427967427457\" \ndata-ad-slot=\"6272152047\"><\/ins> \n<script> \n(adsbygoogle = window.adsbygoogle || []).push({}); \n<\/script>\n<\/div><ul class=\"wp-block-latest-posts__list has-dates wp-block-latest-posts\"><li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/www.apvnorge.no\/cz\/bert-ransomware-forcibly-shut-down-esxi-virtual-machines-to-disrupt-recovery\/\">BERT Ransomware Forcibly Shut Down ESXi Virtual Machines to Disrupt Recovery<\/a><time datetime=\"2025-07-08T20:38:10+02:00\" class=\"wp-block-latest-posts__post-date\">8th July 2025<\/time><div class=\"wp-block-latest-posts__post-excerpt\">New ransomware group employs advanced virtualization attack tactics to maximize damage and hinder organizational recovery efforts. A newly emerged ransomware group known as&nbsp;BERT&nbsp;has introduced a particularly disruptive capability that sets it apart from traditional ransomware operations: the ability to forcibly terminate ESXi virtual machines before encryption, significantly complicating recovery efforts for targeted organizations.&nbsp; First observed\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/www.apvnorge.no\/cz\/bert-ransomware-forcibly-shut-down-esxi-virtual-machines-to-disrupt-recovery\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: BERT Ransomware Forcibly Shut Down ESXi Virtual Machines to Disrupt Recovery<\/span><\/a><\/div><\/li>\n<li><div class=\"wp-block-latest-posts__featured-image\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/i0.wp.com\/www.apvnorge.no\/wp-content\/uploads\/2021\/02\/images.jpg?resize=150%2C150&amp;ssl=1\" class=\"attachment-thumbnail size-thumbnail wp-post-image\" alt=\"\" style=\"\" srcset=\"https:\/\/i0.wp.com\/www.apvnorge.no\/wp-content\/uploads\/2021\/02\/images.jpg?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/www.apvnorge.no\/wp-content\/uploads\/2021\/02\/images.jpg?resize=64%2C64&amp;ssl=1 64w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/div><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/www.apvnorge.no\/cz\/hackers-are-now-hiding-malware-in-windows-event-logs\/\">Hackers are now hiding malware in Windows Event Logs<\/a><time datetime=\"2022-05-09T14:38:19+02:00\" class=\"wp-block-latest-posts__post-date\">9th May 2022<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Security researchers have noticed a malicious campaign that used Windows event logs to store malware, a technique that has not been previously documented publicly for attacks in the wild. The method enabled the threat actor behind the attack to plant fileless malware in the file system in an attack filled with techniques and modules designed\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/www.apvnorge.no\/cz\/hackers-are-now-hiding-malware-in-windows-event-logs\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: Hackers are now hiding malware in Windows Event Logs<\/span><\/a><\/div><\/li>\n<li><div class=\"wp-block-latest-posts__featured-image\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/i0.wp.com\/www.apvnorge.no\/wp-content\/uploads\/2021\/02\/images.jpg?resize=150%2C150&amp;ssl=1\" class=\"attachment-thumbnail size-thumbnail wp-post-image\" alt=\"\" style=\"\" srcset=\"https:\/\/i0.wp.com\/www.apvnorge.no\/wp-content\/uploads\/2021\/02\/images.jpg?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/www.apvnorge.no\/wp-content\/uploads\/2021\/02\/images.jpg?resize=64%2C64&amp;ssl=1 64w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/div><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/www.apvnorge.no\/cz\/hundreds-of-hp-printers-vulnerable-to-remote-code-execution-flaws\/\">Hundreds of HP printers vulnerable to remote code execution flaws<\/a><time datetime=\"2022-03-22T14:27:59+01:00\" class=\"wp-block-latest-posts__post-date\">22nd March 2022<\/time><div class=\"wp-block-latest-posts__post-excerpt\">HP has published security advisories for three critical-severity vulnerabilities affecting hundreds of its LaserJet Pro, Pagewide Pro, OfficeJet, Enterprise, Large Format, and DeskJet printer models. The first security bulletin warns about about a buffer overflow flaw that could lead to remote code execution on the affected machine. Tracked as CVE-2022-3942, the security issue was reported\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/www.apvnorge.no\/cz\/hundreds-of-hp-printers-vulnerable-to-remote-code-execution-flaws\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: Hundreds of HP printers vulnerable to remote code execution flaws<\/span><\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/www.apvnorge.no\/cz\/german-government-advises-against-using-kaspersky-antivirus\/\">German government advises against using Kaspersky antivirus<\/a><time datetime=\"2022-03-16T09:40:42+01:00\" class=\"wp-block-latest-posts__post-date\">16th March 2022<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Germany&#8217;s Federal Office for Information Security, BSI, is warning companies against using Kaspersky antivirus products due to threats made by Russia against the EU, NATO, and Germany.Kaspersky is a Moscow-based cybersecurity and antivirus provider founded in 1997, that has a long history of success, but also controversy over the company&#8217;s possible relationship with the Russian\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/www.apvnorge.no\/cz\/german-government-advises-against-using-kaspersky-antivirus\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: German government advises against using Kaspersky antivirus<\/span><\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/www.apvnorge.no\/cz\/ubisoft-confirms-cyber-security-incident-resets-staff-passwords\/\">Ubisoft confirms &#8216;cyber security incident&#8217;, resets staff passwords<\/a><time datetime=\"2022-03-15T12:37:56+01:00\" class=\"wp-block-latest-posts__post-date\">15th March 2022<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Video game developer Ubisoft has confirmed that it suffered a &#8216;cyber security incident&#8217; that caused disruption to its games, systems, and services. The announcement comes after multiple Ubisoft users had reported issues last week accessing their Ubisoft service. Data extortion group LAPSUS$, who has claimed responsibility for hacking Samsung, NVIDIA, and Mercado Libre thus far,\u2026 <a class=\"wp-block-latest-posts__read-more\" href=\"https:\/\/www.apvnorge.no\/cz\/ubisoft-confirms-cyber-security-incident-resets-staff-passwords\/\" rel=\"noopener noreferrer\">Read more<span class=\"screen-reader-text\">: Ubisoft confirms &#8216;cyber security incident&#8217;, resets staff passwords<\/span><\/a><\/div><\/li>\n<\/ul>\n\n<ul class=\"wp-block-archives-list wp-block-archives\">\t<li><a href='https:\/\/www.apvnorge.no\/cz\/2025\/07\/'>July 2025<\/a>&nbsp;(1)<\/li>\n\t<li><a href='https:\/\/www.apvnorge.no\/cz\/2022\/05\/'>May 2022<\/a>&nbsp;(1)<\/li>\n\t<li><a href='https:\/\/www.apvnorge.no\/cz\/2022\/03\/'>March 2022<\/a>&nbsp;(4)<\/li>\n\t<li><a href='https:\/\/www.apvnorge.no\/cz\/2021\/06\/'>June 2021<\/a>&nbsp;(1)<\/li>\n\t<li><a href='https:\/\/www.apvnorge.no\/cz\/2021\/04\/'>April 2021<\/a>&nbsp;(3)<\/li>\n\t<li><a href='https:\/\/www.apvnorge.no\/cz\/2021\/03\/'>March 2021<\/a>&nbsp;(7)<\/li>\n\t<li><a href='https:\/\/www.apvnorge.no\/cz\/2021\/02\/'>February 2021<\/a>&nbsp;(14)<\/li>\n\t<li><a href='https:\/\/www.apvnorge.no\/cz\/2019\/09\/'>September 2019<\/a>&nbsp;(1)<\/li>\n\t<li><a href='https:\/\/www.apvnorge.no\/cz\/2018\/11\/'>November 2018<\/a>&nbsp;(1)<\/li>\n\t<li><a href='https:\/\/www.apvnorge.no\/cz\/2018\/10\/'>October 2018<\/a>&nbsp;(1)<\/li>\n\t<li><a href='https:\/\/www.apvnorge.no\/cz\/2018\/08\/'>August 2018<\/a>&nbsp;(1)<\/li>\n\t<li><a href='https:\/\/www.apvnorge.no\/cz\/2018\/05\/'>May 2018<\/a>&nbsp;(3)<\/li>\n<\/ul><div id=\"apvno-3529344592\" class=\"apvno-after apvno-entity-placement\"><script>\r\n_adsys_id = 33949;\r\n_adsys_size = 1;\r\n<\/script>\r\n<script src=\"https:\/\/d.wedosas.net\/d.js\"><\/script>    \r\n<\/br>\r\n<div>\r\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script>\r\n<!-- AD-4 -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:inline-block;width:970px;height:250px\"\r\n     data-ad-client=\"ca-pub-7003427967427457\"\r\n     data-ad-slot=\"6272152047\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script><\/div>\r\n<a href=\"https:\/\/affiliates.ssl.com\/820-3-1-13.html\" target=\"_blank\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" style=\"border:0px\" src=\"https:\/\/i0.wp.com\/affiliates.ssl.com\/media\/banners\/SSL-banner-UC-certificate-2-v5.png?resize=640%2C79&#038;ssl=1\" width=\"640\" height=\"79\" alt=\"Microsoft Exchange SAN UCC SSL\"><\/a><\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"closed","template":"","meta":{"om_disable_all_campaigns":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"jetpack_post_was_ever_published":false,"footnotes":""},"class_list":["post-1577","page","type-page","status-publish","hentry"],"translation":{"provider":"WPGlobus","version":"3.0.2","language":"cz","enabled_languages":["en","no","cz"],"languages":{"en":{"title":true,"content":true,"excerpt":false},"no":{"title":false,"content":false,"excerpt":false},"cz":{"title":true,"content":true,"excerpt":false}}},"aioseo_notices":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P9T0bk-pr","jetpack-related-posts":[],"jetpack_likes_enabled":true,"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.apvnorge.no\/cz\/wp-json\/wp\/v2\/pages\/1577","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.apvnorge.no\/cz\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.apvnorge.no\/cz\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.apvnorge.no\/cz\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.apvnorge.no\/cz\/wp-json\/wp\/v2\/comments?post=1577"}],"version-history":[{"count":22,"href":"https:\/\/www.apvnorge.no\/cz\/wp-json\/wp\/v2\/pages\/1577\/revisions"}],"predecessor-version":[{"id":2113,"href":"https:\/\/www.apvnorge.no\/cz\/wp-json\/wp\/v2\/pages\/1577\/revisions\/2113"}],"wp:attachment":[{"href":"https:\/\/www.apvnorge.no\/cz\/wp-json\/wp\/v2\/media?parent=1577"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}